Question 1 |
The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?
172.57.88.62 and 172.56.87.23 | |
10.35.28.2 and 10.35.29.4 | |
191.203.31.87 and 191.234.31.88 | |
128.8.129.43 and 128.8.161.55 |
Question 1 Explanation:
Question 2 |
In networking, UTP stands for
Unshielded T-connector port | |
Unshielded twisted pair | |
Unshielded terminating pair | |
Unshielded transmission process |
Question 2 Explanation:
Question 3 |
The address resolution protocol (ARP) is used for
Finding the IP address from the DNS | |
Finding the IP address of the default gateway | |
Finding the IP address that corresponds to a MAC address | |
Finding the MAC address that corresponds to an IP address |
Question 3 Explanation:
Question 4 |
Which of the following is a MAC address?
192.166.200.50 | |
00056A:01A01A5CCA7FF60 | |
568, Airport Road | |
01:A5:BB:A7:FF:60 |
Question 4 Explanation:
Question 5 |
What is the primary purpose of a VLAN?
Demonstrating the proper layout for a network | |
Simulating a network | |
To create a virtual private network | |
Segmenting a network inside a switch or device |
Question 5 Explanation:
Question 6 |
SHA-1 is a
encryption algorithm | |
decryption algorithm | |
key exchange algorithm | |
message digest function |
Question 6 Explanation:
Question 7 |
Advanced Encryption Standard (AES) is based on
Asymmetric key algorithm | |
Symmetric key algorithm | |
Public key algorithm | |
Key exchange |
Question 7 Explanation:
Question 8 |
The primary purpose of an operating system is
To make most efficient use of the computer hardware | |
To allow people to use the computer | |
To keep systems programmers employed | |
To make computers easier to use |
Question 8 Explanation:
Question 9 |
Which is the correct definition of a valid process transition in an operating system?
Wake Up: ready \rightarrow running | |
Dispatch: ready \rightarrow running | |
Block: ready \rightarrow running | |
Timer runout: ready \rightarrow block |
Question 9 Explanation:
Question 10 |
The correct matching of the following pairs is
\begin{array}{|l|l|l|l|} \hline \text{A.} & \text{Disk check} & \text{i.} & \text{Round robin} \\\hline \text{B.}& \text{Batch processing} & \text{ii.} & \text{Scan} \\\hline \text{C.} & \text{Time sharing} & \text{iii.} & \text{LIFO} \\\hline \text{D.} & \text{Stack operation} & \text{iv.} & \text{FIFO} \\\hline \end{array}
\begin{array}{|l|l|l|l|} \hline \text{A.} & \text{Disk check} & \text{i.} & \text{Round robin} \\\hline \text{B.}& \text{Batch processing} & \text{ii.} & \text{Scan} \\\hline \text{C.} & \text{Time sharing} & \text{iii.} & \text{LIFO} \\\hline \text{D.} & \text{Stack operation} & \text{iv.} & \text{FIFO} \\\hline \end{array}
A-iii, B-iv, C-ii, D-i | |
A-iv, B-iii, C-ii, D-i | |
A-iii, B-iv, C-i, D-ii | |
A-ii, B-iv, C-i, D-iii |
Question 10 Explanation:
There are 10 questions to complete.